diff options
author | Joas Schilling <coding@schilljs.com> | 2021-03-01 19:42:34 +0100 |
---|---|---|
committer | Joas Schilling <coding@schilljs.com> | 2021-03-01 19:42:34 +0100 |
commit | 9569df7405317726d7e60911a9c95a755017ac70 (patch) | |
tree | 683a388e0c63d5055c73e861b9138aa8e59bbf6a /core/js/setupchecks.js | |
parent | 91f260fe29239e62fc473a645c30502431d505f7 (diff) | |
download | nextcloud-server-9569df7405317726d7e60911a9c95a755017ac70.tar.gz nextcloud-server-9569df7405317726d7e60911a9c95a755017ac70.zip |
Add target black and noref rules to doc links
Signed-off-by: Joas Schilling <coding@schilljs.com>
Diffstat (limited to 'core/js/setupchecks.js')
-rw-r--r-- | core/js/setupchecks.js | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/core/js/setupchecks.js b/core/js/setupchecks.js index c483454cb91..9eb9c515f99 100644 --- a/core/js/setupchecks.js +++ b/core/js/setupchecks.js @@ -711,13 +711,13 @@ var minimumSeconds = 15552000; if(isNaN(transportSecurityValidity) || transportSecurityValidity <= (minimumSeconds - 1)) { messages.push({ - msg: t('core', 'The "Strict-Transport-Security" HTTP header is not set to at least "{seconds}" seconds. For enhanced security, it is recommended to enable HSTS as described in the <a href="{docUrl}" rel="noreferrer noopener">security tips ↗</a>.', {'seconds': minimumSeconds, docUrl: tipsUrl}), + msg: t('core', 'The "Strict-Transport-Security" HTTP header is not set to at least "{seconds}" seconds. For enhanced security, it is recommended to enable HSTS as described in the <a target="_blank" rel="noreferrer noopener" href="{docUrl}">security tips ↗</a>.', {'seconds': minimumSeconds, docUrl: tipsUrl}), type: OC.SetupChecks.MESSAGE_TYPE_WARNING }); } } else { messages.push({ - msg: t('core', 'Accessing site insecurely via HTTP. You are strongly advised to set up your server to require HTTPS instead, as described in the <a href="{docUrl}">security tips ↗</a>.', {docUrl: tipsUrl}), + msg: t('core', 'Accessing site insecurely via HTTP. You are strongly advised to set up your server to require HTTPS instead, as described in the <a target="_blank" rel="noreferrer noopener" href="{docUrl}">security tips ↗</a>.', {docUrl: tipsUrl}), type: OC.SetupChecks.MESSAGE_TYPE_WARNING }); } |